Cryptology ePrint Archive

?

Channel Reputation Rank

#32
?

Activity Status

Alive

last updated

According to the data and stats that were collected, 'Cryptology ePrint Archive' channel has an outstanding rank. The channel mostly uses medium-length articles along with sentence constructions of the advanced readability level, which is a result that may indicate difficult texts on the channel, probably due to a big amount of industrial or scientific terms.

About 'Cryptology ePrint Archive' Channel

The Cryptology ePrint Archive provides rapid access to recent research in cryptology. Papers have been placed here by th...

? Updates History Monthly Yearly
JavaScript chart by amCharts 3.13.1Jun, 2024Jul, 2024Aug, 2024Sep, 2024Oct, 2024Nov, 2024Dec, 2024Jan, 2025Feb, 2025Mar, 2025Apr, 2025May, 2025050100150200250300Show all
? Content Ratio
JavaScript chart by amCharts 3.13.1Texts
? Average Article Length

Medium-length materials prevail on 'Cryptology ePrint Archive' that may be an effective tactic to grip their readers’ attention with a wider range of helpful content. There are also longer items making up more than one third of all articles, which can provide a deeper insight into their subjects. Moreover, there are a few short articles.

short

long

? Readability Level

Advanced readability level of 'Cryptology ePrint Archive' content is probably targeted at well-educated subscribers as not all readers might clearly understand their texts. There are also some articles with medium readability level.

advanced

basic

? Sentiment Analysis

Positive emotional expressions prevail throughout the texts: they may include favorable reviews, appreciation or praise in regard to the subjects addressed on the channel. However, the channel also contains some rather negative or critical records that make up just a small amount of all its content.

positive

negative

Recent News
Arbigraph: Verifiable Turing-Complete Execution Delegation

Dependence on online infrastructure is rapidly growing as services like online payments and insurance replace traditional options, while others, like...

+
Thunderbolt: A Formally Verified Protocol for Off-Chain Bitcoin Transfers

We present Bitcoin Thunderbolt, a novel off-chain protocol for asynchronous, secure transfer of Bitcoin UTXOs between uncoordinated users. Unlike prior...

+
Strong keys for tensor isomorphism cryptography

Sampling a non degenerate (that is, invertible) square matrix over a finite field is easy, draw a random square matrix and discard if the determinant...

+
Post Quantum Cryptography (PQC) Signatures Without Trapdoors

Some of our current public key methods use a trap door to implement digital signature methods. This includes the RSA method, which uses Fermat's little...

+
The Role of Quantum Computing in Enhancing Encryption Security: A Review

This paper examines how quantum computing enhances the encryption system. It studies the relationship between cryptography and quantum physics. The paper...

+
Breaking ECDSA with Two Affinely Related Nonces

The security of the Elliptic Curve Digital Signature Algorithm (ECDSA) depends on the uniqueness and secrecy of the nonce, which is used in each signature...

+
Reducing Honest Re-Encryption Attack to Chosen Ciphertext Attack

Proxy re-encryption (PRE) schemes allow a delegator to designate a proxy to re-encrypt its ciphertext into a ciphertext that the delegatee can decrypt...

+
Priv-PFL: A Privacy-Preserving and Efficient Personalized Federated Learning Approach

Federated Learning (FL) allows clients to engage in learning without revealing their raw data. However, traditional FL focuses on developing a single...

+
Two Party Secret Shared Joins

We present concrete techniques for adapting the protocols of Mohassel et al (CCS 2020) and Badrinarayanan et al (CCS 2022) for compute SQL-like querying...

+
Hermes: Efficient and Secure Multi-Writer Encrypted Database

Searchable encryption (SE) enables privacy-preserving keyword search on encrypted data. Public-key SE (PKSE) supports multi-user searches but suffers...

+
Fherret: Proof of FHE Correct-and-Honest Evaluation with Circuit Privacy from MPCitH

The major Fully Homomorphic Encryption (FHE) schemes guarantee the privacy of the encrypted message only in the honest-but-curious setting, when the server...

+

Unfortunately Cryptology ePrint Archive has no news yet.

But you may check out related channels listed below.

? Locations

Related channels

  • Open Research Online: No conditions. Results ordered -Date Deposited.

    Open research Online. This archive contains material related to the research output of The Open University in the UK. Mo...

  • Mashable

    Mashable is a leading source for news, information & resources for the Connected Generation. Mashable reports on the imp...

  • Free Vector Archive

    Free vector art and graphics archive

  • E27

    Internet, Startups, Business, Investments and Tech in Asia

  • OUR Archive

    The Otago University Research Archive digital repository system captures, stores, indexes, preserves, and distributes di...